Traffic pattern change noted in Fiesta exploit kit

Published: 2015-05-04. Last Updated: 2017-01-17 03:14:12 UTC
by Brad Duncan (Version: 1)
0 comment(s)

A few hours ago, Jerome Segura, Senior Security Researcher at Malwarebytes, tweeted about a change in traffic patterns from Fiesta exploit kit (EK) [1].

What had been semi-colons in the URLs from Fiesta EK are now commas.  Here's what we saw from my previous diary on Fiesta EK last week [2]:

Here's what I saw from infecting a host with Fiesta EK a short while ago:

Any signatures for detecting Fiesta EK that depend on those semi-colons will need to be updated.

A pcap of the traffic is available at http://malware-traffic-analysis.net/2015/05/04/2015-05-04-Fiesta-EK-traffic.pcap.zip, and a zip file of the associated malware is at http://malware-traffic-analysis.net/2015/05/04/2015-05-04-Fiesta-EK-malware.zip

The ZIP file is password-protected with the standard password.  If you don't know it, email admin@malware-traffic-analysis.net and ask.

I checked out the payload from this infection, and it has a digital signature spoofing Microsoft.

Didn't get any traffic out of the malware payload from publicly-available malware analysis tools:

While generating traffic for my previous diary on Fiesta EK, I saw 3 different payloads within a 2 hour period.  Every once in a while, I've seen digital signatures from Fiesta EK malware payloads, but I'm not sure what this particular payload is.  Haven't really had time to analyze it.  If anyone does have time, please leave a comment.

---
Brad Duncan, Security Researcher at Rackspace
Blog: www.malware-traffic-analysis.net - Twitter: @malware_traffic

References:

[1] https://twitter.com/jeromesegura/status/595002036027985921
[2] https://isc.sans.edu/diary/Actor+using+Fiesta+exploit+kit/19631

Keywords:
0 comment(s)

Comments


Diary Archives